[129339] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: just seen my first IPv6 network abuse scan, is this the start

daemon@ATHENA.MIT.EDU (Matthias Flittner)
Fri Sep 3 07:43:40 2010

Date: Fri, 03 Sep 2010 13:43:20 +0200
From: Matthias Flittner <matthias.flittner@de-cix.net>
To: nanog@nanog.org
In-Reply-To: <AANLkTimrj7ZqcE2dq1wbgJbokFyWbbG=FY08_n9S2T5D@mail.gmail.com>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--------------enigE24AAF96CBDE3A5B8DA600ED
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

Hi,
> Since recently we noticed  "Neighbour table overflow" warnings from
> the kernel on a lot of Linux machines. As this was very annoying for
> us and our customers I started to dump traffic and tried to find the
> cause.
sounds for me as an typicall IPv6 DoS attack. (see RFC3756)

Sheng Jiang has discussed this issue in his draft:
http://tools.ietf.org/html/draft-jiang-v6ops-nc-protection-01

regards,
-F


--------------enigE24AAF96CBDE3A5B8DA600ED
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iQEcBAEBAgAGBQJMgN9bAAoJEIZn8Rym6s4ACR4H/Ali/XoQBBPdAhNvpqDH9HPr
QGk82R//00GYCMggtpXEbgsg9CVAfaQDxaRv81T6e5E3XzxAQbGelzBm733PnwXX
HqMXsoVbBVdbQ6TIw2qwq25JyNQV6OdiJtoEFqrQvm18TNi1uTeJqt7Emjvl3cC3
XdSP58VaV1rKbreqB7bRcmoXhXnM/Wbp+3spUMCIbzK7KW+5s8zqhgFzB3zqKjt5
EPWmbmHnVzjOo+lMjpzKKE4C2odh8ZilzeSU9laonHCLxyL2Cd5NvLiGQ+UioLfi
HWb2RyYKLFOGmRZ8Wk4CUDWkwGsvn71pjl2aOZ8bLtSMXoKPIyTtyAYdmPWztoQ=
=KZAb
-----END PGP SIGNATURE-----

--------------enigE24AAF96CBDE3A5B8DA600ED--


home help back first fref pref prev next nref lref last post